Search

Your search keyword '"Key distribution"' showing total 5,511 results

Search Constraints

Start Over You searched for: Descriptor "Key distribution" Remove constraint Descriptor: "Key distribution"
5,511 results on '"Key distribution"'

Search Results

1. Quantum intrusion detection system using outlier analysis.

2. Kirchhoff meets Johnson: In pursuit of unconditionally secure communication.

3. Quantum intrusion detection system using outlier analysis

4. Experimental demonstration of quantum encryption in phase space with displacement operator in coherent optical communications.

5. Study of Network Security Based on Key Management System for In-Vehicle Ethernet.

6. Kirchhoff meets Johnson: In pursuit of unconditionally secure communication

7. Securing Asymmetric Key Cryptography in 6G Wireless and Mobile Environments: A Comprehensive Review and Proposed Hybrid Cryptosystem

8. A Tale of Two Automotive Security Services: A Formal Analysis

9. Distinct difference configurations in groups

10. Authentication and key distribution protocol based on Diffie-Hellman algorithm and physically unclonable functions.

11. Wireless-Channel Key Distribution Based on Laser Synchronization.

12. A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks

13. A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT

14. Dynamic Secure Key Distribution Based on Dispersion Equalization and Cellular Automata for Optical Transmission.

15. A Provably Secure ECC-Based Key Distribution Scheme for Secure Message Transmission in Vehicular Ad Hoc Networks

18. A Secure Key Management on ODMRP in Mesh-Based Multicast Network

19. Secured and Lightweight Key Distribution Mechanism for Wireless Sensor Networks

20. Exploration of Quantum Cryptography Security Applications for Industrial Control Systems

21. DYNAMIC KEY GENERATION AND DISTRIBUTION COMPARISON USING MACHINE LEARNING INTEGRATED NODE AUTHENTICATION ROUTING PROTOCOL FOR IMPROVING QOS IN VANET.

22. An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks.

23. Validate Merchant Server for Secure Payment Using Key Distribution

24. An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network.

25. Wireless-Channel Key Distribution Based on Laser Synchronization

26. Authenticated Tree-Based R-LWE Group Key Exchange.

27. Combined Optical Fiber Transmission System Based on QNSC and BER-LM.

28. Minimal key set of binary key-derivation tree in cloud storage.

29. Quantum Computing Cryptography and Lattice Mechanism.

30. Dynamic Secure Key Distribution Based on Dispersion Equalization and Cellular Automata for Optical Transmission

33. Privacy Preserving OpenPGP Public Key Distribution with Spamming Resistance

34. Quantum Computation-Based Secured Key Distribution Protocols

35. An efficient key distribution Scheme for WSN with Mutual Healing Capability.

36. A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS.

37. Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey.

38. Securely Cloud Data Storage and Sharing

39. Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms

40. Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment

41. Key Life Cycle and Estimation of Time for Revocation of Keys in Cryptographic Systems

43. Key Management Scheme for Secure Group Communication

45. An Operation Method for Uplink Science Meta Data Transmission Based on Satellite-to-Ground Large-Loop Comparison

46. From Parallelism to Nonuniversality: An Unconventional Trajectory

47. Comparative Analysis of Cryptographic Key Management Systems

49. An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks

50. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security.

Catalog

Books, media, physical & digital resources